An employee with authorized access to sensitive project files is observed exhibiting several potential risk indicators. They have recently started working unusually late hours, expressed significant dissatisfaction with management, and have been attempting to access files unrelated to their job responsibilities. These behaviors are MOST indicative of what type of threat?
-
A
An external threat actor attempting to brute-force network access.
-
B
A negligent insider who is unintentionally violating policy.
-
C
A potential malicious insider threat.
-
D
A compromised insider whose credentials have been stolen.